Author of the publication

Resistance of S-Boxes against Algebraic Attacks.

, and . FSE, volume 3017 of Lecture Notes in Computer Science, page 83-94. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compress Multiple Ciphertexts Using ElGamal Encryption Schemes., , and . IACR Cryptology ePrint Archive, (2012)A New ID-based Signature with Batch Verification., , and . IACR Cryptology ePrint Archive, (2004)Revisiting the Hybrid Attack on Sparse Secret LWE and Application to HE Parameters., and . WAHC@CCS, page 11-20. ACM, (2019)A New Additive Homomorphic Encryption based on the co-ACD Problem., , and . ACM Conference on Computer and Communications Security, page 287-298. ACM, (2014)Fast Batch Verification of Multiple Signatures., and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 442-457. Springer, (2007)A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents., and . Public Key Cryptography, volume 4939 of Lecture Notes in Computer Science, page 328-343. Springer, (2008)An Identity-Based Signature from Gap Diffie-Hellman Groups., and . Public Key Cryptography, volume 2567 of Lecture Notes in Computer Science, page 18-30. Springer, (2003)Efficient verifiable computation over quotient polynomial rings., , and . Int. J. Inf. Sec., 21 (5): 953-971 (2022)Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption., , , and . IEEE Trans. Inf. Theory, 54 (11): 5155-5171 (2008)Cryptanalysis of the CLT13 Multilinear Map., , , , and . J. Cryptol., 32 (2): 547-565 (2019)